header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Permanent Cross-Site Scripting (XSS) in FreePBX 2.5.x – 2.6.0

A permanent Cross Site Scripting vulnerability was found in FreePBX 2.5.x and 2.6, because the application fails to sanitize user-supplied input. The vulnerability can be triggered by any logged-in user who is able to add an Inbound Route.

Multiple directory Traversal Vulnerabilites in Testlink TestManagement and Execution System.

Multiple directory traversal vulnerabilities has been found in Testlink(http://www.teamst.org/) a popular and acclaimed free, open source Test management tool written in PHP. The issue discovered can only be exploited with an authenticated session. This directory traversal vulnerability is present in the file /testlink/lib/usermanagement/userInfo.php & In testlink 1.8.4 these issues can be exploited by setting the variable "editUser"& "locale" like below with a HTTP POST request.

Joomla Component com_libros SQL Injection Vulnerability

Admin login bilgileri alinabilir. http://server/index.php?option=com_libros&task=detail&Itemid=27&id=[EXPLOIT] Exploit:null+union+select+1,2,3,4,concat(username,0x3a,password),6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49+from+jos_users--

Joomla Component com_prime

A directory traversal vulnerability exists in Joomla Component com_prime, which allows an attacker to read arbitrary files on the server. This is due to the application not properly sanitizing user-supplied input to the 'lang' parameter. An attacker can leverage this vulnerability to read sensitive files on the server, such as the /etc/passwd file.

Xunlei XPPlayer ActiveX Remote Exec 0day POC

This exploit allows remote attackers to execute arbitrary code on vulnerable installations of Xunlei XPPlayer ActiveX. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Xunlei XPPlayer ActiveX control, which listens by default on TCP port 8888. By sending a specially crafted packet to this port, an attacker can gain arbitrary code execution under the context of the user.

VLC vs 0.6.8 [b][c][d][a] .ASS file buffer overflow exploit(win32 universal)

This exploit is a buffer overflow vulnerability in VLC media player version 0.6.8. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted .ASS file. The exploit has been tested on Windows XP SP2 and works every time.

TrendMicro Web-Deployment ActiveX Remote Exec 0day POC

This is a proof-of-concept exploit for a remote execution vulnerability in TrendMicro Web-Deployment ActiveX. The vulnerability allows an attacker to execute arbitrary code on the target system by sending a specially crafted request to the vulnerable ActiveX control. The exploit was tested on Windows XP SP3 with Internet Explorer 6.

Microsoft Internet Explorer Object Tag Memory Corruption Vulnerability

This vulnerability exists in Microsoft Internet Explorer due to a memory corruption issue when processing an object tag. An attacker can exploit this vulnerability by convincing a user to open a malicious web page containing a specially crafted object tag. Successful exploitation could result in arbitrary code execution in the context of the current user.

Recent Exploits: